Showing 3,801 - 3,820 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 3801

    Chaos-Based Engineering Applications with a 6D Memristive Multistable Hyperchaotic System and a 2D SF-SIMM Hyperchaotic Map by Fei Yu, Shuai Qian, Xi Chen, Yuanyuan Huang, Shuo Cai, Jie Jin, Sichun Du

    Published 2021-01-01
    “…Finally, we analyze the security of the proposed PRNG and image encryption mechanism, respectively. …”
    Get full text
    Article
  2. 3802

    Query-Biased Preview over Outsourced and Encrypted Data by Ningduo Peng, Guangchun Luo, Ke Qin, Aiguo Chen

    Published 2013-01-01
    “…For both convenience and security, more and more users encrypt their sensitive data before outsourcing it to a third party such as cloud storage service. …”
    Get full text
    Article
  3. 3803

    An Integrated Image Encryption Scheme Based on Elliptic Curve by Ijaz Khalid, Tariq Shah, Sayed M. Eldin, Dawood Shah, Muhammad Asif, Imran Saddique

    Published 2023-01-01
    “…Due to the extensive demand for digital images across all fields, the security of multimedia data over insecure networks is a challenging task. …”
    Get full text
    Article
  4. 3804

    Reputation-Based Leader Selection Consensus Algorithm with Rewards for Blockchain Technology by Munir Hussain, Amjad Mehmood, Muhammad Altaf Khan, Rabia Khan, Jaime Lloret

    Published 2025-01-01
    “…Blockchain technology is an emerging decentralized and distributed technology that can maintain data security. It has the potential to transform many sectors completely. …”
    Get full text
    Article
  5. 3805

    Research on pairing-free certificateless batch anonymous authentication scheme for VANET by Cheng SONG, Ming-yue ZHANG, Wei-ping PENG, Zong-pu JIA, Zhi-zhong LIU, Xi-xi YAN

    Published 2017-11-01
    “…To solve the problem of security and efficiency of anonymous authentication in vehicular ad hoc network,a pairing-free certificateless batch anonymous authentication scheme was proposed.The public and private keys and pseudonyms were jointly generated by the trusted third party and vehicle,so the system security didn't depend on the tamper device.The scheme can realize authentication,anonymity,traceability,unforgeability,forward or backward security,and so on.Furthermore,under the random oracle model,the scheme can resist Type I and Type II attacks.Because there is no need to use certificates during authentication,the system storage load is effectively reduced.At the same time,the scheme realizes the batch message authentication on the basis of pairing-free operation,so the authentication efficiency is improved.Therefore,the scheme has important theoretical significance and application value in the resource-limited internet of things or embedded environment.…”
    Get full text
    Article
  6. 3806

    A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and CRT by Wei LIAO, Lesheng HE, Heng YIN, Shengtao YU, Jiarui QUAN

    Published 2023-12-01
    “…A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and Chinese remainder theorem (CRT) was proposed to solve the problems such as the incomplete reliability of ZigBee network trust center and the lack of identity authentication when accessing the network.The proposed scheme can not only realize two-way authentication of anonymous identity, but also ensure the security of key distribution when ZigBee network structure changes dynamically.It is mainly based on a ZigBee and NB-IoT wireless heterogeneous gateway, so that the server can effectively manage the nodes in the network through this gateway.From security analysis and comparison with other related literature, the proposed scheme has higher security, with anonymity and unlink ability.In addition, the results show that the proposed scheme has more advantages than other schemes on the computational overhead.…”
    Get full text
    Article
  7. 3807

    An improved RFID authentication protocol based on quadratic residue by Zhiliang LIU

    Published 2018-04-01
    “…In view of the existing radio frequency identification(RFID) authentication protocol based on quadratic residue in the security and cost aspects of the loopholes and deficiencies,an improved RFID bidirectional authentication protocol based on the quadratic residue was designed.The improved protocol was mixed with random number encryption under the framework of the quadratic residue,which makes the message certification and identification more efficient and fast in database authentication and identification; the ultra-lightweight bit replacement operations and XOR encryption communication information was introduced,which reduces the cost of system computing; in database,the random number checking mechanism was added to avoid attacks such as agreement to be synchronized and denial of service attacks; finally,the GNY logical proof of the protocol was given,which shows the feasibility of the improved protocol.The protocol security and performance analysis indicate that the improved protocol has higher security and lower cost.…”
    Get full text
    Article
  8. 3808

    Triple receiver public key encryption cryptosystem by Liutao ZHAO, Lin ZHONG, Jidong LIU, Caiqun WANG, Dan WU

    Published 2020-12-01
    “…A triple receiver public key cryptosystem was proposed.In the cryptosystem,a sender encrypted a message and sent to three receivers,while the three receivers were able to decrypt the message with their own private keys.Based on bilinear map,two triple receiver public key encryption schemes with different security were constructed.If the gap bilinear Diffie-Hellman (GBDH) problem and the computational Diffie-Hellman (CDH) problem were proved formally to be intractable,then the two schemes proposed were semantically secure against chosen-plaintext attacks and against adaptive chosen ciphertext attacks respectively.The proposed scheme only added an exponential operation and a hash operation,and constructed three independent receivers which had a high efficiency.Analyses show that proposed scheme can improve the security of TLS protocol and apply to hierarchical public key cryptosystems.…”
    Get full text
    Article
  9. 3809

    Research on multi-channel routing threats and defense for cognitive ad hoc network by Jing-yu FENG, Xu DU, Hong-gang WANG, Wen-hua HUANG

    Published 2016-10-01
    “…In the environment of scarce spectrum resources,cognitive ad hoc network which is independent with infrastruc-ture and fixed spectrum allocation policy,has been also developed quickly.Due to the characteristic of multi-channel routing,cognitive ad hoc network is commonly perceived as an environment offering both opportunities and threats.To further un-derstand the multi-channel routing threats,the current research situation and development trend,the types of threats were analyzed in terms of the node routing and the multi-channel selection,and several typical security methods were concluded.Meanwhile,the most important solution to keep the security of cognitive radio network was found to build trust relationship among cognitive users.Trust management was just the basic technology to solve the security problems of multi-channel routing.Finally,the current problems of related works and research trends in this area were discussed.…”
    Get full text
    Article
  10. 3810

    Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain by Xiaodong YANG, Wanting XI, Jiaqi WANG, Aijia CHEN, Caifen WANG

    Published 2021-12-01
    “…To solve the problems of privacy and security in the electronic evidence sharing of Internet of vehicles, a sharing scheme of electronic evidence in the Internet of vehicles based on signcryption and blockchain was proposed.The evidence ciphertext and the evidence report were stored in the cloud server and the block chain respectively to realize the secure storage and sharing of the electronic evidence.The identity-based signcryption technology was used to ensure the confidentiality of data, and the proxy re-encryption technology was used to realize the sharing of electronic evidence of Internet of vehicles by insurance companies.The aggregation signature technique was introduced to reduce the computation cost of multi vehicle user signature verification.The reliability of electronic evidence was improved by using credibility incentive mechanism.Security analysis shows that the proposed scheme achieves data confidentiality, integrity, verifiability and unforgeability.Compared with the existing schemes, the proposed scheme has certain advantages in terms of computational overhead.…”
    Get full text
    Article
  11. 3811

    Attack Analysis Framework of Space-Integrated-Ground Information Network Based on Cybersecurity Knowledge Graph by Yulu QI, Rong JIANG, Xing RONG, Aiping LI

    Published 2021-09-01
    “…While realizing global coverage, random access, on-demand service, security and credibility, the space-integrated-ground information network(SGIN) is confronted with more complex and variable security threats.Compared with the internet, satellite network has a lot of diff erences, such as highly dynamic changes of topology, transfer protocol and data format.In terms of these questions, it was necessary to integrated the rule of satellite network attacks into the rules of APT attacks, developed the cybersecurity knowledge graph and the attack rules library to analyzed the attacks of the SGIN.The pattern of attack rules was expressed based on time-space data model, which was used to completed the attack chain when there were non-continuous missed data or false positives data.The attack analysis framework proposed in this paper could accurately perceived the security status of the SGIN in real time , and provided decision support for the SGIN.…”
    Get full text
    Article
  12. 3812

    A Torus-Chaotic System and Its Pseudorandom Properties by Jizhao Liu, Xiangzi Zhang, Qingchun Zhao, Jing Lian, Fangjun Huang, Yide Ma

    Published 2020-01-01
    “…Furthermore, the pseudorandom properties of output sequence are well studied and a random number generator algorithm is proposed, which has the potential of being used in several cyber security systems such as the verification code, secure QR code, and some secure communication protocols.…”
    Get full text
    Article
  13. 3813

    Survey of identity resolution system in industrial Internet of things by Yuzheng REN, Renchao XIE, Shiqin ZENG, Haoran ZHAO, Jiayi YU, Ru HUO, Tao HUANG, Yunjie LIU

    Published 2019-11-01
    “…With the development of the internet of things (IoT),5G and industrial technology,industrial IoT has become a new research field.Due to the specific requirements of delay,security and stability in industrial production,the traditional DNS has limitations to meet the needs of industrial IoT because of its single identity object,rigid resolution results,and weak security.In this context,how to provide efficient,flexible and secure resolution services for universal objects has become a hot area worldwide.Firstly,we discussed the design principles and key supporting technologies of the identity resolution system in industrial IoT.Then summarized and compared the existing identity resolution systems in detail.Next,the new identity resolution schemes in academic research were introduced.Finally,the core problems and the future research trend in this field were discussed.…”
    Get full text
    Article
  14. 3814

    BCP-based joint delegation learning model and protocol by Sheng GAO, Kang XIANG, Youliang TIAN, Weijie TAN, Tao FENG, Xiaoxue WU

    Published 2021-05-01
    “…In order to realize data security sharing and reduce the computing costs of clients in data mining process, a joint delegation learning model and protocol based on BCP homomorphic encryption algorithm was proposed.Firstly, a privacy preserving method based on false records was proposed for the security of decision tree model.Secondly, in view of the vertical and horizontal distribution of data, the corresponding delegation learning protocols based on privacy preserving delegation dot product algorithm and privacy preserving delegation entropy algorithm was proposed.Finally, the security proof and the performance analysis of delegation learning protocols and decision tree model structure were given.The results show that the privacy protection method based on false records does not affect the final model construction, and the final model obtained by each client is the same as that constructed by real data.…”
    Get full text
    Article
  15. 3815

    Performance analysis of secrecy rate for SWIPT in massive antenna by Hui BAO, Minmin ZHANG, Yaqing YAO, Hui WANG

    Published 2017-09-01
    “…In the multi-drop broadcast system,the existing research is to optimize the single-user security rate in the complete channel state information.In fact,it’s impossible that there exists only one user in the system.The base station often receives incomplete channel state information.Aiming at this problem,a robust beamforming scheme was proposed.In the multi-user case,considering the influence of channel estimation error on the system security rate,the particle swarm optimization algorithm was used to optimize the emission beamforming vector,artificial noise covariance and power split ratio to ensure that the user collects a certain energy while maximizing the safe transmission rate.The simulation results show that the proposed scheme is slightly lower than the security rate in the ideal case,but it is meaningful to the actual system,taking into account the existence of eavesdropping users and the estimation error.…”
    Get full text
    Article
  16. 3816

    Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage by Guangjun LIU, Wangmei GUO, Jinbo XIONG, Ximeng LIU, Changyu DONG

    Published 2021-07-01
    “…To reduce the security implementation cost of the outsourcing data audit mechanism for the regenerating-coding-based distributed storage systems, an orthogonal algebraic coding method was put forward to construct a lightweight privacy-preserving audit scheme based on linear homomorphic authentication.The homomorphic authentication tags were generated with the orthogonalization between the file encoded data and the private secret key vector, and the privacy protection of the auditing response message was achieved by using the random masking that was constructed by randomizing the orthogonal basis vectors of the specific sub-vector of the user’s secret key.The work realized the effective integration of algebraic coding, privacy protection, and security auditing.Theoretical analysis shows that the proposed scheme can realize the information-theoretic security in the regenerating-coding-based storage applications.Compared with the existing works, the proposed scheme is of low computational complexity and communication overhead, and better performance advantages.…”
    Get full text
    Article
  17. 3817

    The Herd Health Handbook for Goat Producers: Biosecurity at the Farm Level by Ray Mobley, Carmen Lyttle-N’guessan

    Published 2009-12-01
    “…FAMU006, a 20-page illustrated fact sheet by Ray Mobely and Carmen Lyttle-N'guessan, describes aspects of an effective bio-security program, bio-security measures, food safety concerns, and how HACCP works. …”
    Get full text
    Article
  18. 3818

    The Herd Health Handbook for Goat Producers: Biosecurity at the Farm Level by Ray Mobley, Carmen Lyttle-N’guessan

    Published 2009-12-01
    “…FAMU006, a 20-page illustrated fact sheet by Ray Mobely and Carmen Lyttle-N'guessan, describes aspects of an effective bio-security program, bio-security measures, food safety concerns, and how HACCP works. …”
    Get full text
    Article
  19. 3819

    Research on Manageable and Controllable Mobile VPDN Solution by Yue Huang, Yingqi Wei

    Published 2013-04-01
    “…Mobile VPDN is also known as wireless IP private network or 3G IP private network.It offers data private network service based on 3G network to all enterprise customers.Key factors of mobile VPDN,such as flexible network building,the policies of security authentication and service guarantee,were analyzed.A security-enhanced model and a controllable networking solution were introduced.…”
    Get full text
    Article
  20. 3820